SlideShare une entreprise Scribd logo
1  sur  10
Discovery of Ranking Fraud for
Mobile Apps
Presented By
Naresh
TABLE OF CONTENTS
 Abstract
 Existing System
 Proposed System
 Hardware Requirements
 Software Requirements
ABSTRACT
 Ranking fraud in the mobile App market refers to
fraudulent or deceptive activities which have a purpose of
bumping up the Apps in the popularity list.
 A holistic view of ranking fraud and propose a ranking
fraud detection system for mobile Apps.
 we investigate three types of evidences, i.e., ranking
based evidences, rating based evidences and review
based evidences, by modeling Apps’ ranking, rating and
review behaviors through statistical hypotheses tests.
Existing System
 In Existing system, while there are some related
work, such as web ranking spam detection, online
review spam detection and mobile App
recommendation, the problem of detecting ranking
fraud for mobile Apps is still under-explored.
This study can be grouped into three categories.
 first category :- web ranking spam detection.
 second category :-detecting online review spam.
 third category:-mobile App recommendation
Disadvantages
 Although some of the existing approaches can be
used for anomaly detection from historical rating and
review records, they are not able to extract fraud
evidences for a given time period (i.e., leading
session).
 Cannot able to detect ranking fraud happened in
Apps’ historical leading sessions
 There is no existing benchmark to decide which
leading sessions or Apps really contain ranking fraud.
Proposed System
 we first propose to accurately locate the ranking fraud by
mining the active periods, namely leading sessions, of mobile
Apps.
 we propose an optimization based aggregation method to
integrate all the evidences for fraud detection.
 we evaluate the proposed system with real-world App data
collected from the iOS App Store for a long time period.
Advantages
 The proposed framework is scalable and can be
extended with other domain generated evidences for
ranking fraud detection.
 Experimental results show the effectiveness of the
proposed system, the scalability of the detection
algorithm as well as some regularity of ranking fraud
activities.
 we develop four intuitive baselines and invite five
human evaluators to validate the effectiveness of our
approach Evidence Aggregation based Ranking
Fraud Detection (EA-RFD).
Hardware Requirements
 System : Pentium IV 2.4 GHz.
 Hard Disk : 80 GB and above
 Ram : 512 MB and above.
Software Requirements
 Operating system : Windows XP/7.
 Coding Language : JAVA/J2EE
 IDE : Netbeans 7.4
 Database : MYSQL
THANK YOU

Contenu connexe

Tendances

Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21
koolkampus
 
Software Engineering ppt
Software Engineering pptSoftware Engineering ppt
Software Engineering ppt
shruths2890
 

Tendances (20)

Smart Health Prediction Report
Smart Health Prediction ReportSmart Health Prediction Report
Smart Health Prediction Report
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
 
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured ChartStock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptxFACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
 
Software reliability growth model
Software reliability growth modelSoftware reliability growth model
Software reliability growth model
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21
 
Software Engineering ppt
Software Engineering pptSoftware Engineering ppt
Software Engineering ppt
 
software characteristics
software characteristicssoftware characteristics
software characteristics
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
System dependability
System dependabilitySystem dependability
System dependability
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Xss
XssXss
Xss
 

En vedette

Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
Nexgen Technology
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
Boopathi Kumar
 

En vedette (17)

Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
main project doument
main project doumentmain project doument
main project doument
 
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPSDISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
 
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
 
Big Data Application Architectures - Fraud Detection
Big Data Application Architectures - Fraud DetectionBig Data Application Architectures - Fraud Detection
Big Data Application Architectures - Fraud Detection
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 
Big data
Big dataBig data
Big data
 
Project center in trichy @ieee 2016 17 titles for java and dotnet
Project center in trichy @ieee 2016 17 titles for java and dotnetProject center in trichy @ieee 2016 17 titles for java and dotnet
Project center in trichy @ieee 2016 17 titles for java and dotnet
 
AppStore SEO
AppStore SEOAppStore SEO
AppStore SEO
 
document1-2 FINAL-FINALLL
document1-2 FINAL-FINALLLdocument1-2 FINAL-FINALLL
document1-2 FINAL-FINALLL
 
Mobile UA 2.0: Three trends in Mobile Marketing for 2016 and Beyond
Mobile UA 2.0: Three trends in Mobile Marketing for 2016 and BeyondMobile UA 2.0: Three trends in Mobile Marketing for 2016 and Beyond
Mobile UA 2.0: Three trends in Mobile Marketing for 2016 and Beyond
 
Bigdata and ai in p2 p industry: Knowledge graph and inference
Bigdata and ai in p2 p industry:  Knowledge graph and inferenceBigdata and ai in p2 p industry:  Knowledge graph and inference
Bigdata and ai in p2 p industry: Knowledge graph and inference
 
60780174 49594067-cs1403-case-tools-lab-manual
60780174 49594067-cs1403-case-tools-lab-manual60780174 49594067-cs1403-case-tools-lab-manual
60780174 49594067-cs1403-case-tools-lab-manual
 

Similaire à Discovery of ranking fraud for mobile apps

Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps
1crore projects
 
Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps
1crore projects
 

Similaire à Discovery of ranking fraud for mobile apps (20)

IJET-V3I1P2
IJET-V3I1P2IJET-V3I1P2
IJET-V3I1P2
 
IRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
IRJET- Discovery of Fraud Apps Utilizing Sentiment AnalysisIRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
IRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
 
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MININGA DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
 
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET-  	  Detection of Ranking Fraud in Mobile ApplicationsIRJET-  	  Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile Applications
 
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPSDISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Pindroid - Android Malware Detection Tool
Pindroid - Android Malware Detection Tool Pindroid - Android Malware Detection Tool
Pindroid - Android Malware Detection Tool
 
VTU final year project report Main
VTU final year project report MainVTU final year project report Main
VTU final year project report Main
 
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile Apps
 
Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps
 
Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
Fraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search RankFraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search Rank
 
Detection of Fake reviews
Detection of Fake reviews Detection of Fake reviews
Detection of Fake reviews
 
Choosing the Right Testing Strategy to Scale up Mobile App Testing.pdf
Choosing the Right Testing Strategy to Scale up Mobile App Testing.pdfChoosing the Right Testing Strategy to Scale up Mobile App Testing.pdf
Choosing the Right Testing Strategy to Scale up Mobile App Testing.pdf
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applications
 
Zero day malware detection
Zero day malware detectionZero day malware detection
Zero day malware detection
 

Plus de Nagamalleswararao Tadikonda

Plus de Nagamalleswararao Tadikonda (9)

Mobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation frameworkMobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation framework
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 
You tube video promotion by cross network
You tube video promotion by cross networkYou tube video promotion by cross network
You tube video promotion by cross network
 
Provable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systemsProvable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systems
 
FRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook ApplicationsFRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook Applications
 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-based
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
A seminar report on i cloud
A  seminar report on i cloudA  seminar report on i cloud
A seminar report on i cloud
 

Dernier

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Dernier (20)

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

Discovery of ranking fraud for mobile apps

  • 1. Discovery of Ranking Fraud for Mobile Apps Presented By Naresh
  • 2. TABLE OF CONTENTS  Abstract  Existing System  Proposed System  Hardware Requirements  Software Requirements
  • 3. ABSTRACT  Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up the Apps in the popularity list.  A holistic view of ranking fraud and propose a ranking fraud detection system for mobile Apps.  we investigate three types of evidences, i.e., ranking based evidences, rating based evidences and review based evidences, by modeling Apps’ ranking, rating and review behaviors through statistical hypotheses tests.
  • 4. Existing System  In Existing system, while there are some related work, such as web ranking spam detection, online review spam detection and mobile App recommendation, the problem of detecting ranking fraud for mobile Apps is still under-explored. This study can be grouped into three categories.  first category :- web ranking spam detection.  second category :-detecting online review spam.  third category:-mobile App recommendation
  • 5. Disadvantages  Although some of the existing approaches can be used for anomaly detection from historical rating and review records, they are not able to extract fraud evidences for a given time period (i.e., leading session).  Cannot able to detect ranking fraud happened in Apps’ historical leading sessions  There is no existing benchmark to decide which leading sessions or Apps really contain ranking fraud.
  • 6. Proposed System  we first propose to accurately locate the ranking fraud by mining the active periods, namely leading sessions, of mobile Apps.  we propose an optimization based aggregation method to integrate all the evidences for fraud detection.  we evaluate the proposed system with real-world App data collected from the iOS App Store for a long time period.
  • 7. Advantages  The proposed framework is scalable and can be extended with other domain generated evidences for ranking fraud detection.  Experimental results show the effectiveness of the proposed system, the scalability of the detection algorithm as well as some regularity of ranking fraud activities.  we develop four intuitive baselines and invite five human evaluators to validate the effectiveness of our approach Evidence Aggregation based Ranking Fraud Detection (EA-RFD).
  • 8. Hardware Requirements  System : Pentium IV 2.4 GHz.  Hard Disk : 80 GB and above  Ram : 512 MB and above.
  • 9. Software Requirements  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL